Henderson is an experienced cybersecurity professional with a demonstrated history of working in the computer and network security industry. He is a regular (non-sponsored) contributor to online properties such as CSO, Dark Reading, Forbes, etc. In addition to being a strong writer, speaker/presenter and mentor, he is the global security strategist for Absolute Software where he influences the strategic security direction of our customers and prospective customers. A strong leader and communicator with expertise at a global level, Henderson provides security consultation to many parties and helps evangelize Absolute's industry-leading and unique security offerings.

With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Managing all of your assets and their software requires three foundational steps.

If you browsed the latest security headlines, you'd probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity.

Most of the criminal activity targeting today's enterprises originates at the endpoint, and the majority of modern breaches use known threats or vulnerabilities for which a patch already exists. For this reason, endpoint visibility must be complete and continuous.

As data protection breaches have become daily headline news and everyone becomes increasingly sensitive about privacy, the regulatory regime is getting tougher. Data protection laws in Europe are more important than ever before - especially as the enforcement deadline of the EU GDPR looms.

Enter your email address to reset your password

Already have anISMG account?

Forgot Your Password Message:

Contact Us

Already have anISMG account?

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.